frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

DoED Puts Harvard Under Financial Monitoring: Federal Investigations Create Risk

https://www.thecrimson.com/article/2025/9/20/harvard-heightened-cash-monitoring/
2•rntn•3m ago•0 comments

How to Train an LLM-RecSys Hybrid for Steerable Recs with Semantic IDs

https://eugeneyan.com/writing/semantic-ids/
1•7d7n•4m ago•0 comments

Read the memos sent to Amazon and Microsoft staff about Trump's H-1B changes

https://www.businessinsider.com/read-memos-sent-big-tech-trump-h-1b-changes-2025-9
2•paulpauper•5m ago•0 comments

Why IKEA's Pencil Is the Most Stolen Object

https://thisthat3.substack.com/p/why-ikeas-pencil-is-the-worlds-most
1•ohjeez•12m ago•0 comments

You don't need quantum hardware for post-quantum security

https://blog.cloudflare.com/you-dont-need-quantum-hardware/
1•jgrahamc•14m ago•0 comments

Microsoft memo advises H1B employees to return immediately if currently abroad

https://xcancel.com/onestpress/status/1969374699038675364
5•pfexec•14m ago•1 comments

Cybersecurity Under Pressure: The Rising Stakes in Healthcare Sectors

https://comuniq.xyz/post?t=347
1•01-_-•15m ago•0 comments

Culture Is High Dimensional

https://www.overcomingbias.com/p/culture-is-high-dimensional
2•paulpauper•17m ago•0 comments

Sunscreen for the Planet

https://worksinprogress.co/issue/sunscreen-for-the-planet/
1•paulpauper•18m ago•0 comments

Samsung pre-installed software collecting user data originated from Israel

https://appcloud.zafranudin.my/
2•iqfareez•18m ago•0 comments

Basic Gleam Debugging Tips

https://brian-dot-brian-dot-brian.ghost.io/gleam-debugging-tips/
1•crowdhailer•22m ago•0 comments

Google AI explains why LLMs are deceptive

https://write.as/n3pzqmeuc1nf2
2•unanima•22m ago•0 comments

Deepfake scam alert: here's what you should know

https://www.scambare.com/2025/09/ai-deepfake-scam-alert.html
1•sbworker•23m ago•0 comments

All Electric Austin Arrow

https://www.austinmotorcompany.com/
1•gnabgib•25m ago•0 comments

China's youth unemployment soars to 2-year high as job crunch deepens

https://www.scmp.com/economy/china-economy/article/3325950/chinas-youth-unemployment-soars-2-year...
5•donsupreme•27m ago•0 comments

Oracle eyes $20B AI cloud computing deal with Meta, source says

https://www.reuters.com/business/oracle-talks-with-meta-20-billion-ai-cloud-computing-deal-bloomb...
2•giuliomagnifico•27m ago•0 comments

Show HN: Hamsterbase Tasks – Open-Source, Cross-Platform, Self-Hostable Task App

https://tasks.hamsterbase.com/
2•Cassandra99•28m ago•0 comments

Deep researcher with test-time diffusion

https://research.google/blog/deep-researcher-with-test-time-diffusion/
2•simonpure•29m ago•0 comments

Monocle – AR device that clips onto your glasses

https://www.designboom.com/technology/monocle-world-smallest-ar-device-clip-glasses-brilliant-lab...
2•andsoitis•29m ago•0 comments

Code should be clean because business isn't

https://til.andrew-quinn.me/posts/code-should-be-clean-because-business-isn-t/
1•hiAndrewQuinn•33m ago•0 comments

Could 2028 be the 'YouTube election'?

https://www.politico.com/news/2025/09/20/2028-youtube-election-politics-campaign-00574335
2•c420•35m ago•0 comments

Object Orientation [2013 !]

https://jackrusher.com/journal/on-object-orientation.html
1•signa11•35m ago•0 comments

The pirate-based logic of Rust shared references

http://ais523.me.uk/blog/logic-of-shared-references.html
1•r4um•38m ago•0 comments

Ask HN: How concerned should we be about USB security?

1•turkishdelight•43m ago•5 comments

Seattle Ultrasonics: Ultrasonic Chef's Knife

https://seattleultrasonics.com/
1•hemloc_io•43m ago•0 comments

Show HN: Turn any landing page into a 14-day email drip sequence

https://lumora-ai-copy-2ac5a637.base44.app
1•ahemx_•47m ago•0 comments

Training Text-to-Molecule Models with Context-Aware Tokenization

https://arxiv.org/abs/2509.04476
1•PaulHoule•48m ago•0 comments

Apple Losing Talent to OpenAI

https://www.macrumors.com/2025/09/19/apple-losing-talent-to-openai/
6•mgh2•50m ago•1 comments

Directory of MCP servers and clients

https://mcpmarket.com
1•saikatsg•50m ago•0 comments

Kkrieger: Making an Impossible FPS [video]

https://www.youtube.com/watch?v=bD1wWY1YD-M
1•ibobev•51m ago•0 comments
Open in hackernews

These days, systemd can be a cause of restrictions on daemons

https://utcc.utoronto.ca/~cks/space/blog/linux/SystemdCanBeRestrictionCause
34•zdw•1h ago

Comments

zdw•1h ago
I feel like Docker and other containerization tools are becoming even less relevant given that systemd can twiddle the same isolation bits so there's no real difference in terms of security that using a container tool grants.

Seeing that podman can run containers as systemd services (see https://codesmash.dev/why-i-ditched-docker-for-podman-and-yo... ), it seems like using containers other than as a distribution mechanism has few advantages, and many disadvantages in terms of dependency updates requiring container rebuilds.

baby_souffle•1h ago
> I feel like Docker and other containerization tools are becoming even less relevant given that systemd can twiddle the same isolation bits so there's no real difference in terms of security that using a container tool grants.

I see it as _exactly_ the opposite. Podman gives me more or less the same security controls as systemd and the package/delivery problem is solved.

Call me when `systemctl pull ...` fetches the binary and everything else needed to run it _and_ puts the .service file in the right spot.

JoBrad•56m ago
> Call me when `systemctl pull ...` fetches the binary and everything else needed to run it _and_ puts the .service file in the right spot.

That would be pretty awesome, actually.

o11c•43m ago
I can already hear the systemd-haters complaining about The One True Unix Way™ is to have tools that only do one thing even if that leaves holes in their functionality.

That seems like a `machinectl` task though.

speed_spread•43m ago
That would mean systemd entering package management territory. Now THAT would not be well received.
zdw•14m ago
IMO, docker layering over the OS's built-in package management and update lifecycle in an incompatible ways is far worse than systemd replacing the init system and other service management functionality.

Back in the old days (late 90's, early 2k's) as a sysadmin I'd often write scripts to chroot or in other ways isolate services rather than run them as root, so extending the init system to handle those features feels like it's a logical extension, not a incompatible replacement.

jeroenhd•6m ago
Isn't this literally what podman-systemd does? You don't exactly run a command to pull a container, but just like systemd you place a config file in the right directory, tell podman-systemd to reconfigure itself, and run the service the standard systemd way.
9dev•56m ago
That, and dependency management, no? I’m not going back to installing libwhathaveyou-dev-0.28c1 ever again.
nickysielicki•44m ago
with podman-systemd/"Quadlet" we're basically there:

https://docs.podman.io/en/latest/markdown/podman-systemd.uni...

arianvanp•38m ago
Literally exists.

importctl pull-tar https://example.com/image.tar.gz && portablectl attach image

vlovich123•34m ago
Did you call him?
ndriscoll•30m ago
nixos kind of does that except better. Usually just set services.foo.enabled to true along with any other config you want. It's also super easy to wrap services in a container if you want, and doing so is kept conceptually separate from dependency management. If you want to make your own systemd service, then referencing a package in `ExecStart` or whatever will make it automatically get pulled in as a dependency.
miladyincontrol•50m ago
Container rebuilds are disadvantages? Using mkosi and systemd-nspawn for containers it doesnt really feel that way, still a lot easier to build some distroless app container than to finangle a service to have zero access to other binaries, libraries, or other data entirely.

I dont get the distribution "advantage" building em with mkosi but I'd argue it a weakness as far too many are running containers with who-knows-what inside them.

oncallthrow•41m ago
> I feel like Docker and other containerization tools are becoming even less relevant

Do you work in the software industry?

greatgib•57m ago
Systemd, as usual randomly and suddenly breaking things that worked for decade and for people that asked nothing. Because they know better what you need...
nickysielicki•46m ago
And what's your preferred alternative to what's described in the article? Packaging every single service in its own 500mb ubuntu chroot and using docker? Running a local dhcp server and a bridge interface so that you can selectively expose ports?

Here's an alternative title for this post: these days, two lines in a systemd service file can easily constrain arbitrary applications to just the files and resources they need, and only those.

probably_wrong•40m ago
My grumpy preferred alternative would be "you're supposed to be an init service. That's not your job".
Un1corn•36m ago
> systemd is a suite of basic building blocks for a Linux system.

You can always use a simpler init system if you want

nickysielicki•30m ago
I linked it elsewhere in this thread, but you should really watch this talk, particularly 12:45 through 16:20: https://www.youtube.com/watch?v=o_AIw9bGogo

tl;dr: systemd isn't meant to be an init system, it's meant to manage services, and the alternative world where you don't have a unified system for managing services and events actually sucks.

silverquiet•37m ago
Doesn't SELinux do that (and more)?
amluto•29m ago
The problem is the “more”. SELinux is extremely flexible and does what the configuration tells it to do. And it does not compose well. Want to point whateverd at /var/lib/whatever? Probably works if the distro packages are correct. Want to make /var/lib/whatever be a symlink? Probably does not do what you expect. Want to run a different daemon that accesses /var/lib/whatever or mount it into a container? Good luck. Want to run a second copy of the distro’s whateverd and point it at a different directory? The result depends on how the policy works.

And worst: want to understand what the actual security properties of your policy are? The answer is buried very, very deep.

oncallthrow•36m ago
Did you read the article? The author is complaining that aystemd introduced _optional_ security mechanisms for units. If you don’t like these mechanisms, don’t use them in your units.

Systemd didn’t “break” anything at all here. This author’s arcane debugging workflow doesn’t work for certain units who have opted into the new security mechanisms. But that is hardly systemd’s fault.

wolrah•27m ago
The example given is a distro changing their bundled systemd unit files to use new features, yet you choose to blame systemd?

You do realize distros can also change SysV shell scripts in ways that break your use case as well, right?

miladyincontrol•56m ago
Systemd haters really are often a masterclass in finding problems with flexible, sanely configurable systems.
akkartik•47m ago
When you see a large number of masters spanning diverse skill levels across a population, maybe it's an easy skill to acquire.
oncallthrow•38m ago
I genuinely believe that systemd might have the highest “haters” to “benefit-to-humanity” ratio, out of any software project in history.
Imustaskforhelp•24m ago
Hey, now I am interested in more of such softwares overall.

Like imagine a list where we can create a form where people can give them and give reasonings or just something.

What if I can create a github repo and issues regarding this so that we can discuss about them and I can create a website later if it interests but its a really nice thought experiment.

Are we talking more about uh every software including proprietory too?

Are we talking about lets say websites too or services (what if we extend it to services like websites or even products outside of software niche into things beyond too, that's interesting too)

Another interesting point that comes to my mind might be that cryptocoins might be the lowest inverse to this software project in the sense that I believe that there was very little net positive done to all humanity in general, sure the privacy aspects are nice but still, its not worth having people invest their life savings into it thinking that its going to 100x y'know, I have created a whole article about it being frustated by this idea people think regarding crypto as an investment when it could very well be a crypto"currency" but that's a yap for another day.

I really nerded over this and I think I loved it, we need a really good discussion about it :>

correct_horse•18m ago
I think I agree. I’m curious what software would be in places 2-10. If we’re talking about HN, maybe excel/google sheets? Maybe C++? Recent versions of macOS always seem to get hate, but I think macOS is in a different category.
oncallthrow•5m ago
I think excel/google sheets are generally well regarded in online circles. I also don’t see that much C++ hate, at least not the same kind of viceral hate systemd receives.
nickysielicki•38m ago
The fact that systemd continues to get hate, ~15 years after mass adoption, is a cultural phenomenon worth understanding. Benno Rice of freebsd gave a super interesting talk about this: The Tragedy of systemd: https://www.youtube.com/watch?v=o_AIw9bGogo
jeroenhd•11m ago
I can only imagine how long the Wayland haters will be writing blogs once LTS distro start shipping Wayland-first desktops. Looking at the whole upstart/systemd drama, I'm guessing we'll hit the 2k38 bug before they'll find something new to write about.
jlarocco•4m ago
It's kind of gas lighting to equate the two at this point.

Systemd is strictly better than what came before it, while Wayland still has missing functionality and breaks a lot of use cases.

ziml77•4m ago
[delayed]
dextercd•35m ago
You can use systemd-run with --shell (or a subset of options enabled by --shell) and -p to specify service properties to run commands interactively in a similar environment as your service.

This can help troubleshoot issues and makes experimenting with systemd options faster.

I think there's been some talk about adding a built-in way for systemd-run to copy settings out of a .service file, but it doesn't exist yet.

I've written Perl/Python scripts to do this for me. They're not really aimed at working with arbitrary services, but it should be possible to adapt to different scenarios.

https://gist.github.com/dextercd/59a7e5e25b125d3506c78caa3dd...

There are some gotchas I ran into. For example, with RuntimeDirectory: systemd deletes the directory once the process exits, even if there's still another process running with the same RuntimeDirectory value set.

Zardoz84•34m ago
The private /tmp strike us, when update to Debían 12 servers and find that a batch process cannot access the same temporal files that our web application. Luckily, it's very easy to fix, adding an extra systems file to disable that feature on the Tomcat service.
serbuvlad•31m ago
> One of the traditional rites of passage for Linux system administrators is having a daemon not work in the normal system configuration (eg, when you boot the system) but work when you manually run it as root.

I've don't remember the last time I run a daemon by hand (that I wasn't developed it myself). I always just run the systemd unit via systemctl and debug that.

> A standard thing I do when troubleshooting a chain of programs executing programs executing programs is to shim in diagnostics that dump information to /tmp.

This seems like a very esoteric case in the days of structured logging and log levels.

> A mailer usually can't really tell the difference between 'no one has .forward files' and 'I'm mysteriously not able to see people's home directories to find .forward files in them'

Obviously a daemon that should access files in people's home directories shouldn't have ProtectHome=true. It's the responsibility of the daemon developer or the package maintainer to set appropriate flags based on what the daemon does. Someone had to explicitly write "ProtectHome=true". It's not the default, and it doesn't just appear in the service file.

When in doubt don't set security options at all, instead of shipping a broken daemon that you don't understand why it doesn't work.

Note: please base your daemon on D-Bus or a socket in /run and not on reading arbitrary files from my home directory.

I also don't understand the larger perspective? Should we not make our daemon run in more secure environments?

amaccuish•31m ago
Old Man Yells at Cloud.
amelius•28m ago
I'm ok with it as long as it doesn't cause __any__ confusion whatsoever.